Download now Free registration required
Cryptography is now much more than keeping credit card numbers safe from packet sniffers and laptop thieves. The presenters combine several advances in cryptography theory to construct a model of computation in which a third party securely performs computations for a set of parties who do not trust one another. These parties encrypt their inputs to a computation, then circulate the encrypted values.
- Format: Webcast
- Size: 0 KB